René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

135 lines
4.3 KiB
JSON

{
"id": "CVE-2016-9491",
"sourceIdentifier": "cret@cert.org",
"published": "2018-07-13T20:29:01.613",
"lastModified": "2019-10-09T23:20:31.930",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "ManageEngine Applications Manager 12 and 13 before build 13690 allows an authenticated user, who is able to access /register.do page (most likely limited to administrator), to browse the filesystem and read the system files, including Applications Manager configuration, stored private keys, etc. By default Application Manager is running with administrative privileges, therefore it is possible to access every directory on the underlying operating system."
},
{
"lang": "es",
"value": "ManageEngine Applications Manager 12 y 13 antes de la build 13690 permite que un usuario autenticado que puede acceder a una p\u00e1gina /register.do (muy probablemente limitado a un administrador), navegue por el sistema de archivos y lea los archivos del sistema, incluyendo la configuraci\u00f3n de Applications Manager, las claves privadas almacenadas, etc. Por defecto, Application Manager se ejecuta con privilegios administrativos y, por lo tanto, es posible acceder a todos los directorios del sistema operativo subyacente."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.8
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
},
{
"source": "cret@cert.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-611"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zohocorp:manageengine_applications_manager:12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "627D0D5D-1B83-4480-BE43-5D1F1D95F563"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zohocorp:manageengine_applications_manager:13.0:*:*:*:*:*:*:*",
"matchCriteriaId": "69BC473D-B091-41C9-8C0F-D397B16F0042"
}
]
}
]
}
],
"references": [
{
"url": "http://seclists.org/fulldisclosure/2017/Apr/9",
"source": "cret@cert.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://www.manageengine.com/products/applications_manager/security-updates/security-updates-cve-2016-9491.html",
"source": "cret@cert.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.securityfocus.com/bid/97394/",
"source": "cret@cert.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}